Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1855741.1855750acmotherconferencesArticle/Chapter ViewAbstractPublication PagesosdiConference Proceedingsconference-collections
Article

Automating network application dependency discovery: experiences, limitations, and new solutions

Published: 08 December 2008 Publication History
  • Get Citation Alerts
  • Abstract

    Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple services, spanning many hosts and network components. While the knowledge of such dependencies is invaluable for ensuring the stability and efficiency of these applications, thus far the only proven way to discover these complex dependencies is by exploiting human expert knowledge, which does not scale with the number of applications in large enterprises.
    Recently, researchers have proposed automated discovery of dependencies from network traffic [8, 18]. In this paper, we present a comprehensive study of the performance and limitations of this class of dependency discovery techniques (including our own prior work), by comparing with the ground truth of five dominant Microsoft applications. We introduce a new system, Orion, that discovers dependencies using packet headers and timing information in network traffic based on a novel insight of delay spike based analysis. Orion improves the state of the art significantly, but some shortcomings still remain. To take the next step forward, Orion incorporates external tests to reduce errors to a manageable level. Our results show Orion provides a solid foundation for combining automated discovery with simple testing to obtain accurate and validated dependencies.

    References

    [1]
    EMC SMARTS. http://www.emc.com/products/ family/smarts-family.htm.
    [2]
    HP OpenView. http://www.openview.hp.com.
    [3]
    IBM Tivoli. http://www.ibm.com/software/tivoli/.
    [4]
    Mercury MAM. http://www.mercury.com/us/ products/business-availability-center/ applica%tion-mapping.
    [5]
    Microsoft MOM. http://technet.microsoft.com/ en-us/opsmgr/bb498230.aspx.
    [6]
    Taming Technology Sprawl. http://online.wsj.com/ article/SB120156419453723637.html.html?mod= techno%logy_main_promo_left.
    [7]
    M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen. Performance Debugging for Distributed Systems of Black Boxes. In Proceedings of SOSP, 2003.
    [8]
    P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang. Towards Highly Reliable Enterprise Network Services via Inference of Multi-level Dependencies. In Proc. ACM SIGCOMM, 2007.
    [9]
    P. V. Bahl, P. Barham, R. Black, R. Chandra, M. Goldszmidt, R. Isaacs, S. Kandula, L. Li, J. MacCormick, D. Maltz, R. Mortier, M. Wawrzoniak, and M. Zhang. Discovering Dependencies for Network Management. In HotNets, 2006.
    [10]
    P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for Request Extraction and Workload Modeling. In OSDI, 2004.
    [11]
    G. Bartlett, J. Heidemann, and C. Papadopoulos. Understanding passive and active service discovery. In IMC, 2007.
    [12]
    R. Black, A. Donnelly, and C. Fournet. Ethernet Topology Discovery without Network Assistance. In ICNP, 2004.
    [13]
    O. E. Brigham. The fast fourier transform and its application. In Prentice-Hall, 1988.
    [14]
    A. Brown, G. Kar, and A. Keller. An active approach to characterizing dynamic dependencies for problem determination in a distributed environment. In Intergrated Network Management, 2001.
    [15]
    M. Chen, A. Accardi, E. Kcman, J. Lloyd, D. Patterson, A. Fox, and E. Brewer. Path-based Failure and Evolution Management. In NSDI, 2004.
    [16]
    R. Fonseca, G. Porter, R. H. Katz, S. Shenkar, and I. Stoica. X-Trace: A Pervasive Network Tracing Framework. In NSDI, 2007.
    [17]
    J. F. Kaiser and R. W. Schafer. On the Use of the Io-Sinh Window for Spectrum Analysis. In IEEE Transactions on Acoustics, Speech and Signal Processing, 1980.
    [18]
    S. Kandula, R. Chandra, and D. Katabi. What's Going On? Extracting Communication Rules In Edge Networks. In Proc. ACM SIGCOMM, 2008.
    [19]
    S. Kandula, D. Katabi, and J. P. Vasseur. Shrink: A Tool for Failure Diagnosis in IP Networks. In MineNet, 2005.
    [20]
    R. R. Kompella, J. Yates, A. Greenberg, and A. C. Snoeren. IP Fault Localization via Risk Modeling. In NSDI, 2005.
    [21]
    B. Lowekamp, D. R. O'Hallaron, and T. R. Gross. Topology Discovery for Large Enternet Networks. In SIGCOMM, 2001.
    [22]
    P. Reynolds, J. L. Wiener, J. C. Mogul, M. K. Aguilera, and A. Vahdat. WAP5: black-box performance debugging for widearea systems. In WWW, 2006.

    Cited By

    View all
    • (2023)Murphy: Performance Diagnosis of Distributed Cloud ApplicationsProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604877(438-451)Online publication date: 10-Sep-2023
    • (2021)SherLock: unsupervised synchronization-operation inferenceProceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3445814.3446754(314-328)Online publication date: 19-Apr-2021
    • (2020)Check before you changeProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388285(575-590)Online publication date: 25-Feb-2020
    • Show More Cited By
    1. Automating network application dependency discovery: experiences, limitations, and new solutions

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        OSDI'08: Proceedings of the 8th USENIX conference on Operating systems design and implementation
        December 2008
        384 pages

        Sponsors

        • USENIX Assoc: USENIX Assoc

        In-Cooperation

        Publisher

        USENIX Association

        United States

        Publication History

        Published: 08 December 2008

        Check for updates

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 11 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Murphy: Performance Diagnosis of Distributed Cloud ApplicationsProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604877(438-451)Online publication date: 10-Sep-2023
        • (2021)SherLock: unsupervised synchronization-operation inferenceProceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3445814.3446754(314-328)Online publication date: 19-Apr-2021
        • (2020)Check before you changeProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388285(575-590)Online publication date: 25-Feb-2020
        • (2019)Efficient scalable thread-safety-violation detectionProceedings of the 27th ACM Symposium on Operating Systems Principles10.1145/3341301.3359638(162-180)Online publication date: 27-Oct-2019
        • (2019)DEPOProceedings of the 2019 ACM Symposium on SDN Research10.1145/3314148.3314358(98-111)Online publication date: 3-Apr-2019
        • (2018)Mission-Centric Risk Assessment to Improve Cyber Situational AwarenessProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3233281(1-8)Online publication date: 27-Aug-2018
        • (2018)CRUSOEProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3232798(1-10)Online publication date: 27-Aug-2018
        • (2017)Towards Reliable Application Deployment in the CloudProceedings of the 13th International Conference on emerging Networking EXperiments and Technologies10.1145/3143361.3143388(464-477)Online publication date: 28-Nov-2017
        • (2017)Reflections on Data Integration for SDNProceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization10.1145/3040992.3041006(65-68)Online publication date: 24-Mar-2017
        • (2017)CloudScoutIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2016.261971528:5(1271-1284)Online publication date: 1-May-2017
        • Show More Cited By

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media